9780132214414

0132214415

Your order must be $35 or more to qualify for free economy shipping.
Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.

Get Rewarded for Ordering Your Textbooks!Enroll Now

Customer ReviewsRead Reviews

Write a Review

List Price: $170.67

Marketplace

$1.09

More Prices

Summary

This book has11 core chaptersthat form a complete introduction to networking.Mini chapters follow 4 of the chapters(ch. 1, 3, and 8, and 9) with case studies or hands-on exercisesreinforcing material in the previous core chapter. In addition, three advanced modules at the end of the book (Module A, B, and C) contain material teachers may wish to cover selectively for emphasis

Author Biography

Ray Panko is a professor of IT management at the University of Hawaii's College of Business Administration.

Table of Contents

Preface for Teachers

xxiii

Preface for Students

xxxi

An Introduction To Networking

1

(76)

What Is Networking?

1

(4)

The Internet

2

(2)

Internal Corporate Network Applications

4

(1)

Data Communications and Telecommunications

4

(1)

Single Networks

5

(7)

The Nine Elements of a Network

5

(1)

Client Computers, Server Computers, and Applications

6

(1)

Frames and Packet Switching

6

(1)

Switches and Routers

7

(1)

Access Lines, Trunk Lines, and Multiplexing

8

(1)

Wireless Access Points

9

(1)

How to Talk About Network Costs

9

(3)

LANS and WANS

12

(6)

The First Bank of Paradise

12

(1)

The Bank's Major Buildings

12

(2)

Wide Area Networks (WANs)

14

(1)

Local Area Networks (LANs)

15

(2)

LAN and WAN Transmission Costs and Speeds

17

(1)

WAN Carriers

17

(1)

Internets

18

(15)

Elements of an Internet

21

(2)

Packets Versus Frames

23

(1)

The Internet

24

(4)

Subnets

28

(2)

Intranets and Extranets

30

(1)

IP Address Management

30

(3)

Security

33

(3)

Firewalls

34

(1)

Host Hardening

35

(1)

Cryptographic Protections

35

(1)

Conclusions

36

(6)

Synopsis

36

(6)

Introduction

42

(1)

The Initial Situation

42

(1)

Applications

43

(1)

Internet Applications

43

(1)

File Sharing

44

(1)

Printer Sharing

44

(1)

Access Router and Cable Modem

44

(2)

Access Router

44

(1)

Cable Modem

44

(1)

Coaxial Cable

45

(1)

The Personal Computers

46

(1)

Network Interface Cards (NICs)

46

(1)

Device Driver

46

(1)

Networking Software

46

(1)

Wires, Connectors, and Jacks

47

(2)

UTP Cords

47

(1)

RJ-45 Connectors and Jacks

48

(1)

Patch Cords

49

(1)

The Access Router's Functions

49

(4)

The Access Router's Ethernet Switch

49

(1)

The Access Router's Router Function

50

(1)

The Access Router's DHCP Server

50

(1)

The Access Router's Network Address Translation (NAT) Function

51

(2)

Adding Wireless Transmission

53

(2)

The Problem with Wires

53

(1)

Access Router/Wireless Access Point Alternatives

53

(1)

Wireless NICs

54

(1)

The Downstairs PC

55

(1)

Reflections on Peer-to-Peer Networks Versus Dedicated Servers

55

(3)

Peer-to-Peer Networks

55

(2)

Inexpensive Networking

57

(1)

Operational Problems

57

(1)

Poor Security

57

(1)

Dedicated Servers

57

(1)

Network Attached Storage

57

(1)

Case Analysis

58

(1)

Introduction

59

(1)

Setting Up an Internet Connection

60

(3)

Initial Steps

60

(1)

Next Steps

61

(2)

Allowing Peer-to-Peer Directory and File Sharing

63

(5)

Network Setup Wizard: Welcome to the Network Setup Wizard

63

(1)

Network Setup Wizard: Before You Begin

63

(1)

Network Setup Wizard: Select a Connection Method

63

(3)

Network Setup Wizard: Your Computer Has Multiple Connections

66

(1)

Network Setup Wizard: Give This Computer a Description and Name

66

(1)

New Connection Wizard: Name Your Network

66

(1)

Network Setup Wizard: Ready to Apply Network Settings

67

(1)

Network Setup Wizard: Finish

68

(1)

Accessing Shared Files

68

(2)

Process

68

(1)

Shared Documents (SharedDocs)

68

(1)

Weak Security in Simple File Sharing

69

(1)

Sharing Additional Directories

70

(2)

Run the Network Setup Wizard

70

(1)

Select Another Directory You Wish to Share

70

(1)

In the Directory's Properties Dialog Box

71

(1)

Still No Security

71

(1)

Sharing Printers

72

(5)

Making a Printer Available for Sharing

72

(1)

Using a Shared Printer

73

(4)

Case Study: XTR Consulting: A SOHO Network with Dedicated Servers

77

(17)

Introduction

77

(2)

Peer-to-Peer Service

79

(2)

Inexpensive Networking

79

(1)

Operational Problems

79

(2)

Poor Security

81

(1)

Dedicated Servers

81

(6)

Benefits and Problems

81

(1)

Server Technology

82

(1)

Server Hardware

82

(2)

Network Operating Systems (NOSs) for PC Servers

84

(3)

XTR: The Initial Situation

87

(1)

PCs

87

(1)

Printers

87

(1)

Sneakernet

87

(1)

Remote Access

88

(1)

Internet Access

88

(1)

Maintenance

88

(1)

Broad Network Design

88

(5)

Labor Costs

88

(1)

Switch

88

(1)

Wires

88

(1)

Network Interface Card (NIC)

89

(1)

Dedicated Servers

89

(1)

Dedicated Print Servers

90

(1)

Internet Access

91

(1)

Firewall

92

(1)

Database Processing

92

(1)

Remote Access Service (RAS)

93

(1)

Your Detailed Design

93

(1)

Network Standards

94

(46)

Introduction

94

(1)

Standards Govern the Exchange of Messages

95

(5)

Message Semantics (Meaning)

96

(1)

Message Syntax

96

(2)

General Message Organization

98

(1)

Fields in Headers and Trailers

99

(1)

Reliability and Connections

100

(4)

Reliability

100

(2)

Connection-Oriented and Connectionless Protocols

102

(2)

Connectionless and Unreliable Protocols Dominate

104

(1)

Layered Standards Architectures

104

(7)

Architectures

104

(2)

Layer 1 and Layer 2 Standards for Single Networks (LANs and WANs)

106

(1)

Physical Links

107

(1)

Standards for Internet Transmission

108

(2)

Standards for Applications

110

(1)

Why Layered Architectures?

111

(2)

Breaking Up Large Tasks into Smaller Tasks

111

(1)

Specialization in Standards Design

111

(1)

Simplification in Standards Design

112

(1)

If You Change a Standard at One Layer, You Do Not Have to Change Standards at Other Layers

112

(1)

Layers 1 (Physical) and 2 (Data Link) in Ethernet

113

(2)

Ethernet Physical Layer Standards

113

(1)

Ethernet Frames

113

(2)

Ethernet Characteristics

115

(1)

Layer 3: The Internet Protocol (IP)

115

(3)

Layer 2 Versus Layer 3

115

(1)

The IP Packet

116

(2)

IP Characteristics

118

(1)

Layer 4: The Transport Layer

118

(3)

Layers 3 and 4

118

(1)

TCP: A Reliable Protocol

119

(1)

The User Datagram Protocol (UDP)

120

(1)

Layer 5: HTTP and Other Application Standards

121

(1)

Vertical Communication on Hosts, Switches, and Routers

121

(6)

Layered Communication on the Source Host

121

(4)

On the Destination Host

125

(1)

On Switches and Routers Along the Way

126

(1)

Major Standards Architectures

127

(9)

TCP/IP and OSI Architectures

128

(1)

OSI

129

(3)

TCP/IP

132

(2)

The Application Layer

134

(1)

TCP/IP and OSI: The Hybrid TCP/IP-OSI Standards Architecture

134

(1)

A Multiprotocol World at Higher Layers

135

(1)

Standards at the First Bank of Paradise

136

(1)

Physical and Data Link Layer Standards

136

(1)

Protocols at Higher Layers

136

(1)

Conclusion

136

(4)

Synopsis

136

(4)

Physical Layer Propagation: UTP and Optical Fiber

140

(47)

Introduction: The Physical Layer

140

(1)

Signals and Propagation

141

(1)

Propagation

141

(1)

Signals

141

(1)

Propagation Effects

141

(1)

Binary Data Representation

142

(4)

Inherently Binary Data

142

(1)

Binary Numbers

142

(1)

Encoding Alternatives

143

(1)

Text (ASCII and Extended ASCII)

144

(1)

Raster Graphics

145

(1)

Signaling

146

(6)

Converting Data to Signals

146

(1)

On/Off Signaling

146

(1)

Binary Signaling

146

(3)

Binary Signaling Versus Digital Signaling

149

(1)

Multistate Digital Signaling

150

(1)

Bit Rates

151

(1)

Baud Rate

151

(1)

An Example

151

(1)

Unshielded Twisted Pair (UTP) Wiring

152

(12)

4-Pair UTP and RJ-45

152

(2)

Attenuation and Noise Problems

154

(4)

Electromagnetic Interference (EMI) in UTP Wiring

158

(2)

Serial and Parallel Transmission

160

(2)

Wire Quality Standard Categories

162

(2)

Optical Fiber

164

(10)

Light Through Glass

164

(1)

The Roles of Fiber and Copper

165

(1)

Optical Fiber Construction and Operation

166

(3)

Carrier Fiber

169

(3)

LAN Fiber

172

(2)

Noise and Electromagnetic Interference

174

(1)

Network Topologies

174

(2)

Point-to-Point Topology

175

(1)

Star Topology and Extended Star (Hierarchy) Topology

175

(1)

Mesh Topology

176

(1)

Ring Topology

176

(1)

Bus Topologies

176

(1)

Conclusion

176

(4)

Synopsis

176

(4)

Introduction

180

(1)

Solid and Stranded Wiring

180

(1)

Solid-Wire UTP Versus Stranded-Wire UTP

180

(1)

Relative Advantages

180

(1)

Adding Connectors

180

(1)

Cutting the Cord

181

(1)

Stripping the Cord

181

(1)

Working with the Exposed Pairs

182

(2)

Pair Colors

182

(1)

Untwisting the Pairs

182

(1)

Ordering the Pairs

182

(2)

Cutting the Wires

184

(1)

Adding the Connector

184

(1)

Holding the Connector

184

(1)

Sliding in the Wires

184

(1)

Some Jacket Inside the Connector

184

(1)

Crimping

184

(1)

Pressing Down

184

(1)

Making Electrical Contact

184

(1)

Strain Relief

185

(1)

Testing

185

(2)

Testing with Continuity Testers

185

(1)

Testing for Signal Quality

185

(2)

Ethernet Lans

187

(46)

And the Winner Is . . .

187

(1)

A Short History of Ethernet Standards

188

(2)

Prehistory: Xerox, Intel, and Digital Equipment

188

(1)

The 802 Committee

188

(1)

The 802.3 Ethernet Working Group

188

(1)

Other Working Groups

188

(1)

Ethernet Standards Are OSI Standards

188

(2)

Ethernet Physical Standards

190

(7)

Major Ethernet Physical Layer Standards

190

(4)

Link Aggregation (Trunking)

194

(1)

Ethernet Physical Layer Standards and Network Design

194

(3)

The Ethernet Frame

197

(4)

Layering

197

(1)

The Ethernel Frame's Organization

197

(4)

Basic Data Link Layer Switch Operation

201

(4)

Frame Forwarding with Multiple Ethernet Switches

201

(1)

Hierarchical Switch Topology

202

(2)

Only One Possible Path: Low Switching Cost

204

(1)

Advanced Ethernet Switch Operation

205

(10)

802.1D: The Spanning Tree Protocol (STP)

205

(3)

Virtual LANs and Ethernet Switches

208

(2)

Handling Momentary Traffic Peaks

210

(3)

Hubs and CSMA/CD

213

(1)

Broadcasting

213

(1)

Media Access Control (MAC)

213

(1)

CSMA/CD

213

(1)

Full-Duplex Operation

213

(1)

Latency

214

(1)

Purchasing Switches

215

(7)

Number and Speeds of Ports

215

(1)

Switching Matrix Throughput

216

(1)

Store-and-Forward Versus Cut-Through Switching

217

(1)

Store-and-Forward Ethernet Switches

217

(1)

Cut Through Ethernet Switches

217

(1)

Manageability

218

(2)

Advanced Purchasing Considerations: Physical and Electrical Features

220

(1)

Physical Size

220

(1)

Port Flexibility

220

(1)

Uplink Ports

220

(2)

Electricity

222

(1)

Ethernet Security

222

(1)

Port Access Control (802.1X)

222

(1)

Media Access Control (MAC) Security (802.1AE)

222

(1)

Conclusion

223

(4)

Synopsis

223

(4)

Introduction

227

(1)

Token-Ring Technology

227

(2)

Ring Networks

227

(1)

Token Passing

228

(1)

Early Ethernet and 802.5 Token-Ring Networks

229

(2)

Early Ethernet: CSMA/CD-Bus Networks

229

(1)

802.5 Token-Ring Networks Appear

230

(1)

Ethernet Wins

230

(1)

Shielded Twisted Pair Wiring

231

(1)

Fiber Distributed Data Interface (FDDI)

231

(1)

Return of the Ring

232

(1)

Wireless Lans (WLANs)

233

(45)

Introduction

233

(4)

802.11 Wireless LANs

233

(3)

Bluetooth Personal Area Networks

236

(1)

Emerging Local Wireless Technologies

236

(1)

Radio Signal Propagation

237

(13)

Frequencies

237

(1)

Antennas

238

(1)

Wireless Propagation Problems

239

(2)

Bands and Bandwidth

241

(4)

Normal and Spread Spectrum Transmission

245

(2)

Spread Spectrum Transmission Methods

247

(3)

802.11 WLAN Operation

250

(6)

Typical Operation

250

(3)

Controlling 802.11 Transmission

253

(1)

Media Access Control

253

(1)

CSMA/CA + ACK Media Access Control

253

(1)

CSMA/CA

253

(1)

ACK

254

(2)

Request to Send/Clear to Send (RTS/CTS)

256

(1)

802.11 Transmission Standards

256

(6)

How Fast Are 802.11 Networks?

256

(1)

802.11a

257

(1)

802.11b

258

(1)

802.11g: Today's Dominant Technology

258

(1)

802.11a Redux?

259

(1)

802.11n and MIMO

260

(2)

802.11e Quality of Service (QoS)

262

(1)

802.11 WLAN Security

262

(7)

WLAN Security Threats

262

(1)

WEP Security

263

(2)

WPA (Wireless Protected Access)

265

(1)

802.11i(WPA2)

266

(1)

802.1X Mode Operation

266

(2)

Pre-Shared Key (PSK) Mode

268

(1)

802.11 Wireless LAN Management

269

(3)

Access Point Placement

269

(1)

Remote Management: Smart Access Points and Wireless Switches

270

(2)

Bluetooth PANs

272

(2)

Personal Area Networks (PANs) for Cable Replacement

272

(1)

Disadvantages Compared to 802.11

273

(1)

Advantages Compared to 802.11

273

(1)

Bluetooth Trends

273

(1)

Conclusion

274

(4)

Synopsis

274

(4)

Telecommunications

278

(33)

Introduction

278

(4)

Telecommunications and the PSTN

278

(1)

The Four Elements of the PSTN

279

(2)

Ownership of the PSTN

281

(1)

Circuit Switching

282

(3)

Circuits

282

(1)

Voice Versus Data Traffic

283

(1)

Dial-Up Circuits

283

(1)

Leased Line Circuits

284

(1)

The Access System

285

(7)

The Local Loop

285

(1)

The End Office Switch

286

(1)

Analog-Digital Conversion for Analog Local Loops

286

(3)

Codec Operations

289

(1)

Analog-to-Digital Conversion

289

(2)

Digital-to-Analog Conversion (DAC)

291

(1)

Cellular Telephony

292

(4)

Cellular Service

292

(1)

Cells

292

(1)

Why Cells?

293

(1)

Handoffs Versus Roaming

294

(1)

Cellular Telephone Standards

295

(1)

Voice Over IP (VoIP)

296

(5)

Basic Operation

296

(1)

Corporate VoIP Alternatives

297

(1)

Corporate Concerns with VoIP

298

(1)

VoIP Technology

299

(1)

Speech Codecs

299

(1)

Transport

299

(2)

Signaling in VoIP

301

(1)

Residential Internet Access

301

(7)

Telephone Modems

301

(2)

Digital Subscriber Lines (DSLs)

303

(2)

Cable Modem Service

305

(1)

3C Cellular Data Service

306

(1)

WiMax (802.16) Service

306

(1)

Broadband over Power Lines

307

(1)

Fiber to the Home (FTTH)

308

(1)

Perspective on Speeds and Prices

308

(1)

Conclusion

308

(3)

Synopsis

308

(3)

Wide Area Networks (WANs)

311

(35)

Introduction

311

(3)

WANs and the Telephone Network

311

(1)

Reasons to Build a WAN

312

(1)

High Costs and Low Speeds

313

(1)

Carriers

313

(1)

Point-to-Point Leased Line Networks

314

(6)

Leased Line Networks for Voice and Data

314

(1)

Leased Line Network Topologies

314

(3)

Leased Line Speeds

317

(2)

Digital Subscriber Lines (DSLs)

319

(1)

Public Switched Data Networks (PSDNs)

320

(4)

Leased Lines in Leased Line Data Networks

320

(1)

Public Switched Data Network (PSDN) Access Lines

321

(1)

The PSDN Cloud

321

(1)

OAM&P: Operation, Administration, Maintenance and Provisioning

322

(1)

Service Level Agreements (SLAs)

323

(1)

Virtual Circuit Operation

323

(1)

Frame Relay

324

(4)

The Most Popular PSDN

324

(1)

Components

324

(3)

Frame Relay Virtual Circuits

327

(1)

Asynchronous Transfer Mode (ATM)

328

(2)

Not a Competitor for Frame Relay

328

(1)

Designed for SONET/SDH

329

(1)

Cell Switching

329

(1)

ATM Quality-of-Service Guarantees

329

(1)

Manageability, Complexity, and Cost

329

(1)

Market Strengths

330

(1)

Metropolitan Area Ethernet

330

(3)

Metropolitan Area Networking

330

(1)

E-Line and E-LAN

330

(1)

Attractions of Metropolitan Area Ethernet

330

(2)

Carrier Class Service

332

(1)

Carrier IP Networks

332

(1)

Virtual Private Networks (VPNs)

333

(5)

The Attractiveness of Internet Transmission

333

(2)

SSL/TLS

335

(3)

Market Perspective

338

(2)

Leased Line Networks

338

(1)

Frame Relay

339

(1)

Metropolitan Area Ethernet

340

(1)

Virtual Private Networks (VPNs)

340

(1)

Conclusion

340

(2)

Synopsis

340

(2)

Introduction

342

(1)

Organizational Units

342

(2)

Major Facilities

342

(1)

Branches

342

(2)

External Organizations

344

(1)

The FBP Wide Area Network (WAN)

344

(1)

T3 Lines

344

(1)

Branch Connections

344

(1)

Da Kine Island Affiliate Branch

344

(1)

Credit Card Service

344

(1)

Branch LANs

344

(1)

Internet Access

344

(1)

Anticipated Changes

344

(2)

Outsourcing

344

(1)

Fractional T1 Lines to Branches

344

(2)

TCP/IP Internetworking

346

(51)

Introduction

346

(1)

TCP/IP Recap

347

(1)

The TCP/IP Architecture and the IETF

347

(1)

Simple IP at the Internet Layer

347

(1)

Reliable Heavyweight TCP at the Transport Layer

347

(1)

Unreliable Lightweight UDP at the Transport Layer

348

(1)

IP Routing

348

(6)

Hierarchical IP Addressing

349

(1)

Routers, Networks, and Subnets

350

(1)

Network and Subnet Masks

351

(2)

Multiprotocol Routing

353

(1)

How Routers Process Packets

354

(7)

Switching Versus Routing

354

(1)

A Simplified Routing Table

354

(3)

A Routing Decision

357

(1)

Perspective

358

(1)

Two Routing Table Details

359

(1)

Is the Destination IP Address in a Row's Address Range?

359

(2)

Other Internet Layer Standards

361

(15)

Dynamic Routing Protocols

361

(4)

Address Resolution Protocol (ARP)

365

(2)

Multiprotocol Label Switching (MPLS)

367

(2)

Domain Name System (DNS)

369

(2)

Internet Control Message Protocol (ICMP) for Supervisory Messages at the Internet Layer